Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 844))

Abstract

The Internet of Things (IoT) is changing cities industries and homes. Each of these benefits, however, comes with an enormous risk of security issues and privacy loss. One of the problems is to operate the IoT devices safely and securely, because the complexity increases with the increased number of IoT devices. This expanded complexity makes new security challenges such as safety, privacy, and usability far beyond the difficulties that individual face to provide security to an individual device. This paper highlights security aspects, challenges, importance of security at different layers in IoT, and the existing solutions. Also, different approaches proposed to address security and privacy issues concerning security requirements: authentication, confidentiality, and access control are discussed and analyzed explicitly in the realm of the Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res 26(2):337–359

    Article  Google Scholar 

  2. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Computer networks, vol 76, pp 146–164, ISSN 1389-1286

    Google Scholar 

  3. Balamurugan S, Ayyasamy A, Suresh Joseph K (June 2018) A review on privacy and security challenges in the internet of things (IoT) to protect the device and communication networks. Int J Comput Sci A Inf Sec (IJCSIS) 16(6)

    Google Scholar 

  4. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Article  Google Scholar 

  5. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet of things. IEEE Internet Things J 4(5):1250–1258

    Article  Google Scholar 

  6. Han Y, Hyun J, Jeong T, YOO J-H, Hong JW-K (2016) A smarthome control system based on context and human speech. 18th international conference on advanced communication technology (ICACT)

    Google Scholar 

  7. Raza S, Duquennoy S, Chung T, Yazar D, Voigt T, Roedig U (2011) Securing communication in 6LowPAN with compressed IPsec. International conference on distributed computing in sensor systems and workshops (DCOSS). Barcelona, pp 1–8

    Google Scholar 

  8. Granjal J, Monteiro E, Sa Silva JS (2010) A secure interconnection model for IPv6 enabled wireless sensor networks. IFIP wireless Dyas. Venice, pp 1–6

    Google Scholar 

  9. Jara AJ, Fernandez D, Lopez P, Zamora-Izquierdo M, Skarmeta A (2014) Lightweight MIPv6 with IPSec support. Mobile Inf Syst 37–77

    Google Scholar 

  10. Kothmavr T, Schmitt C, Hu W, Bruenig M, Carle G (2013) DTLS based security and two-way authentication for the internet of things. Ad Hoc Networks

    Google Scholar 

  11. Raza S, Trabalza D, Voigt T (2012) 6LoWPAN compressed DTLS for CoAP. IEEE 8th international conference on distributed computing in sensor systems. Hangzhou, pp 287–289

    Google Scholar 

  12. Brachmann M, Keoh SL, Morchon O, Kumar S (2012) End-to-end transport security in the IP-based internet of things. pp 1–5

    Google Scholar 

  13. Hummen R, Ziegeldorf J, Shafagh H, Raza S, Wehrle K (2013) Towards viable certificate-based authentication for the internet of things. Proceedings HotWiSec workshop. pp 37–42

    Google Scholar 

  14. Alrawais A, Alhothaily A, Hu C, Cheng X (Mar–Apr 2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42

    Google Scholar 

  15. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. pp 685–695

    Google Scholar 

  16. Wissam R, Daniele S, Kouichi S (Oct 2017) A new security middle architectture based on fog computing and cloud to support IoT constrained devices. pp 1–8

    Google Scholar 

  17. Fu K, et al. (2016) Safety, security, and privacy threats posed by accelerating trends in the internet of things. Technical report computing community consortium

    Google Scholar 

  18. Sharaf-Dabbagh Y, Saad W (June 2016) On the authentication of devices in the internet of things. IEEE 17th internattional symposium on a world of wireless, mobile and multimedia networks (WoWMoM). pp 1–3

    Google Scholar 

  19. Salman O, Abdullah S, Elhajj IH, Chehab A, Kayssi A (June 2016) Identity-based authentication scheme for the internet of things. In: IEEE symposium on computers and communication (ISCC). pp 1109–1111

    Google Scholar 

  20. Zungeru AM, Gaboitaolelwel J, Diarra B, Chuma JM, Ang L-M, Kolobel L (2019) A secured smart home switching system based on wireless communications and self-energy harvesting

    Google Scholar 

  21. Tewari, Gupta BB (2018) A robust anonymity preserving authentication protocol for IoT devices. IEEE international conference on consumer electronics (ICCE). Las Vegas, NV, pp 1–5

    Google Scholar 

  22. Sfar AR, Natalizio E, Challal Y, Chtourou Z (2017) A roadmap for security challenges in internet of things

    Google Scholar 

  23. Feng H, Fu W (2010) Study of recent development about privacy and security of the internet of things. International conference on web information systems and mining. Sanya, pp 91–95

    Google Scholar 

  24. Zhao YL (Oct 2013) Research on data security technology in internet of things. Applied mechanics and materials, vol 433–435. Trans Tech Publications, Ltd pp 1752–1755

    Google Scholar 

  25. Weis S, Sarma S, Rivest R, Engels D (2004) Security and privacy aspects of low-cost radio frequency identifications systems, vol 2802

    Google Scholar 

  26. Chifor B-C, Bica I, Patriciu V, Pop F (2018) A security authorization scheme for smart home internet of things devices. Future Gener Comput Syst 740–749

    Google Scholar 

  27. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netwroks 57:2266–2279

    Google Scholar 

  28. Balo F (2016) Internet of things: a survey. Int J Appl Math, Electr Comput

    Google Scholar 

  29. Gubbi J, Buyya R, Marusic S, Palaniswami M (2012) Internet of things (IoT): a vision, architectural elements, and future directions

    Google Scholar 

  30. Shahid N, Aneja S (2017) Internet of things: vision, application areas and research challenges. International conference on I-SSMAC (IoT in social, mobile, analytics and cloud) (I-SMAC). Palladam, pp 583–587

    Google Scholar 

  31. Aggarwal C, Ashish N, Sheth A (2013) The internet of things: a survey from the data-centric perspective

    Google Scholar 

  32. Said O, Masud M (2013) Towards internet of things: survey anad future vision. Int J Comput Networks 5:1–17

    Google Scholar 

  33. Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutorials 16(1):414–454

    Article  Google Scholar 

  34. Granjal J, Monteiro E, Sa Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312

    Google Scholar 

  35. Gil D, Ferrandez A, Mora H, Peeral J (2016) Internet of things: a review of surveys based on context aware intelligent services

    Google Scholar 

Download references

Acknowledgement

We would like to thank M.S. Ramaiah Institute of Technology, Computer Science and Engineering, for supporting this research work.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sultana, S.S., Sangeetha, J. (2022). Internet of Things: Security Mechanisms. In: Bindhu, V., Tavares, J.M.R.S., Du, KL. (eds) Proceedings of Third International Conference on Communication, Computing and Electronics Systems . Lecture Notes in Electrical Engineering, vol 844. Springer, Singapore. https://doi.org/10.1007/978-981-16-8862-1_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8862-1_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8861-4

  • Online ISBN: 978-981-16-8862-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics